Analysis
-
max time kernel
84s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 20:27
Static task
static1
Behavioral task
behavioral1
Sample
fd1552174a82e4ef0cf25e006903e5c9_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fd1552174a82e4ef0cf25e006903e5c9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd1552174a82e4ef0cf25e006903e5c9_JaffaCakes118.html
-
Size
3KB
-
MD5
fd1552174a82e4ef0cf25e006903e5c9
-
SHA1
96679c7115aa6163f72a3a0a4cd666ebe1468845
-
SHA256
92003cc4d01c96a92f8203ac10b0c926dc834b229a762e3c89bede695fe6e3d2
-
SHA512
24a912c1a8e53d86b33b3978a7c19e1da8319bb8232ca7e36f2472aabae59314084530fe44f9a24093d446c3183f8bbf8aaf9fecbbdfa19271bb680b53ed9b83
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000003f47e7815abe0b804e3b5d662e7dda922f13151d6bdabb6fcf41f9860e3a1edb000000000e80000000020000200000004441e56d19b24e309ff198fbec7e91f7d7b71077e27f9029852a5f8bbcc0609020000000f2e2ea06d9d2f05b3f2bdb07b1499289951ed9b3b31f218c0634defcc440ffb140000000776bb692ae414e5e9e4e1cecf127cf6d3c748731b20532ff1b44c01ee051f0efac952df251da03dab209d4c23dcce460bfc2d70615bf507e06f14917a47bdec5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C384931-7DD8-11EF-9DFD-D67B43388B6B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433717101" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c043dee0e411db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000ea85bc63d9266bcb628fc2c8c715fa36e30195ccf6a5485295564f7c68facb0d000000000e80000000020000200000009adf1a3257fb93a5e4d7a81762144f6b94d39ecf7f81e630165083e4659b12cb90000000215f337d084539e379af571ce7e554ee5ff9630b86568672a90d18a85fab256bf3bb165e47b205ce96cedda78bc587e70fe17e4e14431e124a73080c01c26441f906b89229cf7026d55ffb9c68387973aa775edd645724abfff595db9ce85dc56161af1631289702b2614bc1caf61edce6d0027bcd26032a1cf2e91a41ff8af002585cfafe92943b18c7d1d30d6ebf7d40000000f0530f45de9420c09a9ce9840ca45e7f07f167e762e986ab162efd442a7572de9300460ac37491ee4b6fddc198d2455a08d7c233ff4c60f9469b83a367af1015 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2212 2116 iexplore.exe 29 PID 2116 wrote to memory of 2212 2116 iexplore.exe 29 PID 2116 wrote to memory of 2212 2116 iexplore.exe 29 PID 2116 wrote to memory of 2212 2116 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd1552174a82e4ef0cf25e006903e5c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f92bfb267b71273dd818878f9917d60d
SHA198c2bfc2057fc58bd5327f80d4f4823293442853
SHA256831bf31975e00f531e673339830d9591daa033342642ab7042f0e26414701567
SHA5126baa011aceb27569e086e2aa15170c33754991057e010c42cd3cdd48413cff5c98a09e647b4863eb0f0c394814aebf12bb0954e5c9be5dc6e5918ef0531ef8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5288e6f3a43f10e1debf547132826ef07
SHA11c48472135469c4531101f537f0585714f31d36b
SHA256649e2617de2a87c89085ea5f4a6b1ac0300d0e42bc776490f95dc61e8cc61b16
SHA5127fea3a02e8a3b523147e0b2670ae1d9dc6312c241d464548cf50a390ab5b5a6755ecc664bb7354f51dd0cede321675c8e2e11d7d99c42d9af85da38c5f514d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5546bcb2232156fa6069ae517ec4cd885
SHA14c94f8c70f79da4b5cf89094ae14a429d992d56b
SHA25633af8aacf675e9f1bb16479dcd16ad4251e166210d1d6ceb7e5294d4ccfeafbb
SHA512b152b740d3833fc04fc290585bbe1a23aab496cad9c71d3a81293dbaf5bb77baa11104b461a8cffb688edbb5e7674e5ded3b1f828e09e4b65853c3b755d6524b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b0488ccc24cac86062a21e23aee67a1
SHA165076d508862edcd591f94cb5c26b7c616bd2521
SHA2562e46d11a27e10572c567bee1191873efc20450c26bf11266f04dc24c008da742
SHA512d02547b977956e88df8ed0c234b071c4acaa5f76733be76dd007f7f2e92025b39f0928b4a5ec72928926709393995d5e2ec60e9248edae48991746ed17e29bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582cb59f18ae88914a88e6423cb75196e
SHA15fd0bfc669f1ea4419d2e074bbe25f7fe8cf37b5
SHA25601bb7753454d547a8259db2308ec1e02bd28e9a767eb48c72d4595a7f92ad183
SHA5127c94152797a8d5606feda21b6d2dee1f6c93a2fce424d4c9d87b383b67516d4f085d862e8d3e80cb453fe7c3491709b3a5e259e98f3914eec70aaeea28f1a9a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5737e13ff4ae58db8ec6b7a075f92af12
SHA19063a2d806dd108c4d81a4e06df08209f0ba5b01
SHA2560e9fb862f547410ac55f7bb4c0cdce4351125a45fb170ea4e0598c3d609ede90
SHA51271b74352fcee9a86fd2a1bbbcd1e3f3f7aca8d9dd253bff95fa1ea1ed971ac2c7fca0be2e00c6b2a0f0db781f4d0ffdfdb495eb05110d508bd4451cc09ae45c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eac13920c260feae451e28347900e772
SHA1b574e99691ff75e22b4078d1680288125980f4d4
SHA256ce7af49bba49b3fd3105ab5e62bebba839b70957b1c9b12d010dd21c7e626faa
SHA512670ec851592d7ee16b55e673061937701f5417dc0e4dd9529a059ee390445907ba40c495b3e10a87e839591ac344977c9f3aacf458a05f3d3cb085a61e585d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dfa5894da65eb96ee88627fa93e2580
SHA11391a093ebef929a721a695578d043dbaa57f4fc
SHA256bc13e8b93d407a0433fc1db39813ebb5540bda5832a479b50908f08269924656
SHA512cbfd4c3742fd4cadd8ac64791622bd9d28bb04ef48a53d9f30688db459ac0be4711592400ac323b254b8ec935b67c88c2715a33b57276ce49a4583eb323219c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e719c9689089a7b5e7bc93cbea0eaa
SHA18676fa04c66826cccba2911bfd0ff3f854c8025c
SHA256edfc99db361a14d26b4ee92559bd1615d2766738f8ff8847f5413cd70c24272f
SHA5122e689c91aac2baa40a0fd576cc3caed49e336abda01984254f2faa396e75e9ef6fe493634f59e825f6b75df71ecfca1767c6a0bebce707daa2466a6cf133d034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f9142a295d8515e49f53e247e84787e
SHA1e2c0abb80589d739268ef310bd3528e034007d5e
SHA256b9e77dfa726168eb06864805590391e02fd8f8659e3a035d57e5055ca04c4aab
SHA512834b361d3fa486fb7b9f321fc8cce9ed2942d3654a7563a7a54f3102b1212ffe56c9df190b6baed34fc10b81f677e1430be8e107c6793f65312c3ed06bc5a28c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee526e6271f42b1a0c3384b82fe3d09
SHA18271d4235cdff0a3b1b1c2bb56a90905df530827
SHA2568e21899fedfe5f2e4c94cb43437ca44f8ce56b371755e289561e7f826e0e320c
SHA512b7fc059aa007f9927f451759f4bbc91d4b68e215bb6be376a519f7d768d9586f905d52a754660cce28599b57d8c38d2094cbd0d14c3fa738234658efd10bb35c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ec698f85933cba1f7c49d288173d6c
SHA1c33e38418d4ddfd0f01b10c6686ee666a0e10713
SHA256d3b60068b8cfad19002c2685a2844e31f906f28e609899dc6c215a6ae63dc8f7
SHA512d3c9a22d680dbbeaf8e9e0b825ff2ce44897daee3283c3613e788965d7085b5c5ba6cc64ad0276dcfa9445c7893aa525b5d467e447073d45c694b7bf13f28c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5943bd706df953d5b6ed0a9f00d86e222
SHA14073b70d9b6c3f965e15bd59f1b2b82e8f2d0051
SHA256a50ad5ccaae75ec99f968adc28c231024bf9cda6cbf1836a993c89805eb66448
SHA5123774a209c1db048b1242b698eaf3ac0bb2166a0820a30932b3932d19e889d4e7bdcc0119644a75502ec1e91ee348a0e9e9004689b5c583964786a4cbbe846991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c97b55e5a96c7e85d299534f724c7540
SHA1b9d67e108a0b97e727e4edfec072394fd310abec
SHA2562641c9a00f1e658970f31c061be5a40fc4657d068771463c8e80e934461cd29e
SHA5127bfbf211ce3766a14f661b00f2d8dd835c42123b73e70a5f88c2ac5033d6a24d9a1bec2c3fe78a84a605c194e7903afb6ee741dc3f945748a55f19fc09dccce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584a8c329478b36f3a62cf6767f07ad12
SHA149d9fde89373a93437c118e3c16571681629079c
SHA256b0183deabfb17b13fea5fb1e3c19efc6a6a6cf904972a28424e9900cfa3f1d09
SHA5129d720c00a4960001750b4a759dc6042af31ee9487fd6f28af794ef615e941dcd7966a56e40aa987e927b140a238f7804b85d121c7555122e73c222250e7e2e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527aa80a2ba7b92567441aed423ec570b
SHA1bccd737693924ef9493d5555113b28819728588e
SHA256e8492786d0ea76d11b9ec9365f071efa58ca27e91aeee99c62cb1f5b056d5ee7
SHA512ee653b62f9cbc2a3d3b7e4ee1358d1bc2febc686e6ab9229257553f5636c82c7ac65209c7113ba97e0dee747a47b27a9ce3a08068a197e11b78528a926272773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50167762c521553a546c1c98fb958292d
SHA131dce15982cba8d8dc42025188c302910c7e0bed
SHA256ad378bf36ebda379dd19eb4ecc759ec5bdfc47c4b525a01e5eab961ac8b50bf2
SHA51274f9df58c9936cf7ce83d2f0df1194748c6473102497c149490762edef0f9b4e97f98e09ab02181796bafc93a5da864cfe31d3d3b5e142487062785dbb1a7fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5462e5b12d4e8d8f981fdc791b2e86ac6
SHA15b50876daf0ecb1fc7348e476c4dd1512a25f742
SHA2567e8b3b4ec00d1e23a00413ab31da7724144ef78fed745ad715bafe39091ce466
SHA5128563526095e5fb48adf7503983fc0d83bfcd27d4ceb08fa02c423ddb208276aaf35b8a40bf55f860effea3c0d26751501485d2bb576b44e4506a92c6b9ad814a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5873de9d042232efc0bc967dfe67dbc80
SHA1129d35d1e4347116a6ac2fa255b294f59543db1e
SHA25603b5c9e6836855baf69fb5d516d4de3f5f78d8bd0f7ae165e715ee6afef4a508
SHA5126a6e3148b0eae644ea8430057e49f0784be1728d19e7df278eb6096000747f19f54b611b48bb8e65eecc4e2fc395de3a1d4339800f85ae221354cb30b9a9c7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffcd8a200de03a726f9c780f2a56eae3
SHA15a3b73f34c389291aae84462294642d12927c4f6
SHA2562e98c887da182fe240113309bf24f60584686819ae32391be1efd0d75c230daa
SHA5123e65ab4264e1a686c1bdbd39bedbe32f0f93acaa8878aaeb3227f2514ce505a9bcc8626cd427b24e01312de557e84f71ff6f251ceb0a5af4d0b48bb7c95321d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af39489403bbac0aa6607a1f2a68e0ed
SHA14f00f361999b5a1721e9ec0e18ca82d28106ac90
SHA256679bd76e06e7ed1011f8cbe778e6a4cd3648d228662d4dc018ee94a9296bbf2a
SHA512299bb02ce83b65f4111810c4b4d0f67f0e5adf5a5609dbdab5d24151053f293585681014304d9e85dbd9b2701577cfd4a9b10c275af8260ce7bc2d0098e11cfb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b